Sciweavers

176 search results - page 15 / 36
» Generalized Modularity for Community Detection
Sort
View
FASE
2009
Springer
14 years 5 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
C3S2E
2008
ACM
14 years 27 days ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
CIKM
2009
Springer
14 years 5 months ago
Automatic link detection: a sequence labeling approach
The popularity of Wikipedia and other online knowledge bases has recently produced an interest in the machine learning community for the problem of automatic linking. Automatic hy...
James J. Gardner, Li Xiong
DEXAW
2009
IEEE
160views Database» more  DEXAW 2009»
14 years 5 months ago
Automatic User Comment Detection in Flat Internet Fora
—Millions of people are using the World Wide Web and are publishing content online. This user generated content contains many information relevant not only to marketing but to co...
Mathias Bank, Michael Mattes
PERVASIVE
2009
Springer
14 years 5 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...